Atlanta Custom Software Development 

 
   Search        Code/Page
 

User Login
Email

Password

 

Forgot the Password?
Services
» Web Development
» Maintenance
» Data Integration/BI
» Information Management
Programming
VB VB (1648)
VB.net VB.net (736)
C# C# (15)
ASP.net ASP.net (779)
ASP ASP (41)
VC++ VC++ (25)
PHP PHP (0)
JAVA JAVA (4)
JScript JScript (5)
  Database
» SQL Server (708)
» ORACLE (5)
» MySQL (0)
» DB2 (0)
Automation
» C/C++/ASM (11)
» Microcontroller (1)
» Circuit Design (0)
OS/Networking
» Networking (5)
» Unix/Linux (1)
» WinNT/2k/2003 (8)
Graphics
» Flash (0)
» Maya (0)
» 3D max (0)
» Photoshop (0)
Links
» ASP.net (2)
» PC Interfacing (1)
» Networking (4)
» SQL Server (4)
» VB (23)
» VB.net (4)
» VC (3)
» HTML/CSS/JavaScript (10)
Tools
» Regular Expr Tester
» Free Tools

 

Enumerate the users' rights on a DB's objects
Total Hit (2736) SQL Server provides several security levels, and the control that the system administrators can pursue over the DB's objects is extremely accurate. It's often useful to know which rights each user has. As you might know already, a lot of administrative SQL Server tasks can be performed through the p ....Read More
Rating
This is a link to a different site using NT Authentication to login into SQL
Total Hit (1112) This is for using NT authentication (NT users already setup in the Domain) So you need to get the correct spelling of each user in User Manager for Domains. Then it will get the user from NT when they log in and bingo they have permissions to the SQL server database too. ....Read More
Rating
This is a link to a different site Managing Users Permissions on SQL Server
Total Hit (1297) Permissions are the rights to access the database objects. Permissions can be granted to a user or role to allow that user or role to perform operations such as selection, insertion or modification of data rows.
Rating
This is a link to a different site Enhanced SQL Server Security Auditing
Total Hit (1372) Security audit in SQL server captures only successful and failed logins. It does not capture the application that uses the login. Login used by an application may have full read and write access on all of the tables and procedures but the application restricts the users by providing a front-end whic ....Read More
Rating
This is a link to a different site Migrating Logins from One SQL Server to Another
Total Hit (1087) As part of the normal work, a Database Administrator (DBA) will be required to migrate databases between servers. One of the reasons for a migration might be that you are moving an application from a quality assurance (QA) environment to a production environment. Another reason might be your current ....Read More
Rating
This is a link to a different site XML and SQL 2000 (Part 5)
Total Hit (1055) In this article, we will continue exploring different ways of accessing SQL Server data in the XML format via HTTP. As we explained in the previous article, this type of functionality becomes available after creating a virtual directory corresponding to the target database using IIS Virtual Director ....Read More
Rating
This is a link to a different site SQL Server Security Checklist
Total Hit (2555) This month we are going to look at the subject of security. The article is not an in depth tutorial, and is in no way comprehensive. Instead, what I have tried to do is to simply highlight some of the areas where many people (myself included) commonly leave gaps in their security. ....Read More
Rating
This is a link to a different site Implementing Application Roles
Total Hit (1156) SQL Server 7.0, as well as SQL Server 2000, support several technological feature enhancements that allow for a faster time to completion for database and application development. Application roles exist as SQL Server database objects that allow developers and database administrators to assign SQL S ....Read More
Rating


Recommanded Links

 

Home   |  Comment   |  Contact Us   |  Privacy Policy   |  Terms & Conditions   |  BlogsZappySys

© 2008 BinaryWorld LLC. All rights reserved.